diff options
Diffstat (limited to 'security/manager/ssl/nsNSSCertificateDB.h')
-rw-r--r-- | security/manager/ssl/nsNSSCertificateDB.h | 77 |
1 files changed, 77 insertions, 0 deletions
diff --git a/security/manager/ssl/nsNSSCertificateDB.h b/security/manager/ssl/nsNSSCertificateDB.h new file mode 100644 index 000000000..06af6739a --- /dev/null +++ b/security/manager/ssl/nsNSSCertificateDB.h @@ -0,0 +1,77 @@ +/* This Source Code Form is subject to the terms of the Mozilla Public + * License, v. 2.0. If a copy of the MPL was not distributed with this + * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ + +#ifndef nsNSSCertificateDB_h +#define nsNSSCertificateDB_h + +#include "ScopedNSSTypes.h" +#include "certt.h" +#include "mozilla/Mutex.h" +#include "mozilla/NotNull.h" +#include "mozilla/RefPtr.h" +#include "mozilla/UniquePtr.h" +#include "nsIX509CertDB.h" +#include "nsNSSShutDown.h" +#include "nsString.h" + +class nsCString; +class nsIArray; + +class nsNSSCertificateDB final : public nsIX509CertDB + , public nsNSSShutDownObject + +{ +public: + NS_DECL_THREADSAFE_ISUPPORTS + NS_DECL_NSIX509CERTDB + + // Use this function to generate a default nickname for a user + // certificate that is to be imported onto a token. + static void + get_default_nickname(CERTCertificate *cert, nsIInterfaceRequestor* ctx, + nsCString &nickname, + const nsNSSShutDownPreventionLock &proofOfLock); + + static nsresult + ImportValidCACerts(int numCACerts, SECItem *CACerts, nsIInterfaceRequestor *ctx, + const nsNSSShutDownPreventionLock &proofOfLock); + + // This is a separate static method so nsNSSComponent can use it during NSS + // initialization. Other code should probably not use it. + static nsresult + FindCertByDBKey(const char* aDBKey, mozilla::UniqueCERTCertificate& cert); + +protected: + virtual ~nsNSSCertificateDB(); + +private: + + static nsresult + ImportValidCACertsInList(const mozilla::UniqueCERTCertList& filteredCerts, + nsIInterfaceRequestor* ctx, + const nsNSSShutDownPreventionLock& proofOfLock); + + static void DisplayCertificateAlert(nsIInterfaceRequestor *ctx, + const char *stringID, nsIX509Cert *certToShow, + const nsNSSShutDownPreventionLock &proofOfLock); + + CERTDERCerts* getCertsFromPackage(const mozilla::UniquePLArenaPool& arena, + uint8_t* data, uint32_t length, + const nsNSSShutDownPreventionLock& proofOfLock); + nsresult handleCACertDownload(mozilla::NotNull<nsIArray*> x509Certs, + nsIInterfaceRequestor *ctx, + const nsNSSShutDownPreventionLock &proofOfLock); + + // We don't own any NSS objects here, so no need to clean up + virtual void virtualDestroyNSSReference() override { }; +}; + +#define NS_X509CERTDB_CID { /* fb0bbc5c-452e-4783-b32c-80124693d871 */ \ + 0xfb0bbc5c, \ + 0x452e, \ + 0x4783, \ + {0xb3, 0x2c, 0x80, 0x12, 0x46, 0x93, 0xd8, 0x71} \ + } + +#endif // nsNSSCertificateDB_h |